In part one of this series, I highlighted the first five of what I think are the top 10 underutilized or less understood data center security best practices.
If you look at the evolution of critical facilities you will see a fairly consistent increase in complexities as the requirements and expectation of sustaining continuous operations became more and more demanding.
The unprecedented capacity requirements of large social media, search, colocation, and cloud companies are driving massive investments in data center development.
In the past I have written about a myriad of topics and have participated on the speaking circuit discussing “The Cloud has Walls,” “The New Role of the CIO,” and total cost of ownership (TCO).